Unit 1HardwareMicrowave Integrated Circuits1
1.1Classification of Microwave Integrated
Circuits1
1.2Microwave Circuits in a Communication
System6
1.3Summary9
1.4New Words and Expressions10
1.5Questions10
1.6Problems12Unit 2SoftwareMicrosoft Project 2013 and
the Project
Management Domain13
2.1History of Project Management13
2.2Exploring Project Management Industry
Standards14
2.2.1Project Management Body of Knowledge
PMBOK14
2.2.2PRINCE218
2.3WBS, Phases and Control Points, Methodologies,
and Life Cycles20
2.3.1Work Breakdown StructureWBS20
2.3.2Managerial Control21
2.3.3Phases and Gates21
2.3.4Methodologies22
2.3.5Life Cycles22
2.4Using Microsoft Project with Methodologies and
Life Cycles22
2.4.1Waterfall Development Process23
2.4.2Iterative Development23
2.4.3Research Project27
2.5Accommodating Teaming Styles27
2.6Consultants Tips28
2.6.1Determine the Approach to Use in
Managing Your Project28
2.6.2Use WBS as a First Step in Project
Definition28
2.6.3Use the 59 Checklist for Planning29
2.7New Words and Expressions29
2.8Questions30
2.9Problems31Unit 3DatabaseNoSQL Databases: An
Overview 32
3.1NoSQL: What does it mean32
3.2Why NoSQL Databases32
3.3Aggregate Data Models33
3.4Distribution Models34
3.5CAP theorem35
3.6Types of NoSQL Databases36
3.6.1KeyValue databases36
3.6.2Document databases37
3.6.3Column family stores38
3.6.4Graph Databases38
3.7Why choose NoSQL database40
3.8Choosing NoSQL database41
3.9Schemaless ramifications41
3.10Conclusion42
3.11New Words and Expressions42
3.12Questions42
3.13Problems45Unit 4ProgrammingWhat Software
Architects Need to
Know About DevOps 46
4.1What Software Architects Need to Know About
DevOps46
4.2Defining DevOps46
4.3DevOps Practices and Architectural Implications48
4.4Organizational Aspects of DevOps50
4.5Implications for Software Architecture:
Microservices51
4.6Summary52
4.7New Words and Expressions53
4.8Questions53
4.9Problems56Unit 5Office ComputingThe Ultimate
Players Guide to
MinecraftXbox Edition: Gathering Resources 57
5.1Introducing the HUD57
5.2Avoiding Getting Lost60
5.3Improving Your Tools61
5.4Chests: Safely Stashing Your Stuff63
5.5Avoiding Monsters64
5.6Hunger Management66
5.7Your Mission: Food, Resources, and
Reconnaissance67
5.7.1Food on the Run68
5.7.2Finding a Building Site70
5.8A Resourceful Guide to the Creative Mode
Inventory72
5.9The Bottom Line74
5.10New Words and Expressions74
5.11Questions75
5.12Problems77Unit 6NetworkingTroubleshooting Methods
for Cisco IP
Networks78
6.1Troubleshooting Principles78
6.2Structured Troubleshooting Approaches81
6.2.1The TopDown Troubleshooting
Approach83
6.2.2The BottomUp Troubleshooting
Approach84
6.2.3The DivideandConquer
Troubleshooting
Approach85
6.2.4The FollowthePath
Troubleshooting
Approach86
6.2.5The CompareConfigurations Troubleshooting
Approach87
6.2.6The SwapComponents Troubleshooting
Approach88
6.3Troubleshooting Example Using Six Different
Approaches89
6.4Summary91
6.5New Words and Expressions91
6.6Questions92
6.7Problems94Unit 7Mobile ApplicationWhats Special about Mobile
Testing? 95
7.1User Expectations96
7.2Mobility and Data Networks97
7.3Mobile Devices98
7.4Mobile Release Cycles100
7.5Mobile Testing Is Software Testing101
7.6Summary102
7.7New Words and Expressions102
7.8Questions103
7.9Problems105Unit 8Web DevelopmentThe Mobile
Commerce Revolution
and the Current State of Mobile106
8.1Americans and Smartphones106
8.2Mobile Around the World109
8.3Mobile Commerce110
8.4Beyond the Numbers110
8.5The Bottom Line113
8.6New Words and Expressions113
8.7Questions114
8.8Problems116Unit 9SecurityInformation Security
Principles of
Success117
9.1Introduction117
9.2Principle 1: There Is No Such Thing As Absolute
Security117
9.3Principle 2: The Three Security Goals Are
Confidentiality, Integrity, and Availability119
9.3.1Integrity Models119
9.3.2Availability Models120
9.4Principle 3: Defense in Depth as Strategy120
9.5Principle 4: When Left on Their Own, People
Tend to Make the Worst Security Decisions122
9.6Principle 5: Computer Security Depends on Two
Types of Requirements: Functional and
Assurance122
9.7Principle 6: Security Through Obscurity Is Not
an Answer123
9.8Principle 7: Security = Risk Management124
9.9Principle 8: The Three Types of Security
Controls Are Preventative, Detective, and
Responsive126
9.10Principle 9: Complexity Is the Enemy of
Security127
9.11Principle 10: Fear, Uncertainty, and Doubt Do
Not Work in Selling Security127
9.12Principle 11: People, Process, and Technology
Are All Needed to Adequately Secure a System
or Facility127
9.13Principle 12: Open Disclosure of Vulnerabilities
Is Good for Security!128
9.14Summary129
9.15New Words and Expressions129
9.16Questions130
9.17Problems131Unit 10Web ServicesDesigning Software
in a Distributed
World132
10.1Visibility at Scale133
10.2The Importance of Simplicity134
10.3Composition134
10.3.1Load Balancer with Multiple Backend
Replicas134
10.3.2Server with Multiple Backends136
10.3.3Server Tree138
10.4Distributed State139
10.5The CAP Principle142
10.5.1Consistency142
10.5.2Availability143
10.5.3Partition Tolerance143
10.6Loosely Coupled Systems145
10.7Speed147
10.8Summary150
10.9New Words and Expressions151
10.10Questions151
10.11Problems153Unit 11Big DataBig Data Computing154
11.1Introduction154
11.2Apache Hadoop Data modelling156
11.3NoSQL Big Data systems157
11.3.1Key Value stores157
11.3.2Document databases157
11.3.3Graph databases158
11.3.4XML databases158
11.3.5Distributed Peer Stores158
11.3.6Object stores159
11.4Definitions of Data Management 159
11.4.1Data management159
11.4.2Big data management BDM160
11.5The State of Big Data Management160
11.6Big Data Tools162
11.6.1Big data tools: Jaspersoft BI Suite162
11.6.2Big data tools: Pentaho Business
Analytics163
11.6.3Big data tools: Karmasphere Studio and
Analyst163
11.6.4Big data tools: Talend Open Studio164
11.6.5Big data tools: Skytree Server164
11.6.6Big data tools: Tableau Desktop and
Server165
11.6.7Big data tools: Splunk165
11.7New Words and Expressions166
11.8Questions166
11.9Problems168Unit 12Cloud ComputingThe Practice of
Cloud
System Administration: Operations in a
Distributed World169
12.1Distributed Systems Operations170
12.1.1SRE versus Traditional Enterprise
IT170
12.1.2Change versus Stability171
12.1.3Defining SRE173
12.1.4Operations at Scale174
12.2Service Life Cycle177
12.2.1Service Launches178
12.2.2Service Decommissioning180
12.3Organizing Strategy for Operational Teams180
12.3.1Team Member Day Types183
12.3.2Other Strategies185
12.4Virtual Office186
12.4.1Communication Mechanisms187
12.4.2Communication Policies187
12.5Summary188
12.6New Words and Expressions189
12.7Questions190
12.8Problems191Answers to Questions193References194